Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

Course Description

Web Application Penetration Testing Training at Infosectrain is


designed to teach the details of web app penetration testing
in an immersive environment. Our trainers are experts of the
industry and they will teach you Web application analysis,
information gathering and enumeration to add to your skill.
Our Web Application Penetration Testing course will let you
have a hands-on penetration testing experience in our
cloud-hosted lab environment.You will be provided with an
app demonstrating a vulnerability commonly found in a Web
or mobile app. which will help you in learning to assess the
app and exploit it like an experienced professional.

Thus, during this WAPT course you will learn to:

• Exploit and defend web and mobile apps

• Perform static and dynamic analysis of iOS and


Android apps by using popular tools

• Find vulnerabilities in source code, and

• Exploit weaknesses in the implementation of web application


security

www.infosectrain.com | [email protected] 01
Target Audience
Web Application Penetration Testing Course is beneficial for:

• Penetration testers
• Application developers
• Web administrators
• Security analysts

Pre-Requisite
• Basic understanding of HTML, HTTP and JavaScript.
• Knowledge of PHP code will help although it is not mandatory
• one year in an information security role, or equivalent experience
is recommended.

www.infosectrain.com | [email protected] 02
Why Infosec Train?

Certified & Flexible Schedule Access to the


Experienced Instructor recorded
sessions

Post Training Tailor Made Training 4 hrs/day in


Support Weekend/
Weekday

www.infosectrain.com | [email protected] 03
COURSE CONTENT

Web Application Assessment

Authentication vulnerabilities

Authorization vulnerabilities

Improper Input Validation & Injection


vulnerabilities

Insecure file handling

Session & browser manipulation attacks

Information leak

www.infosectrain.com | [email protected] 04
Course Content

Web Application Assessment


• OWASP Top 10 Vulnerabilities
• Threat Modelling Principle
• Site Mapping & Web Crawling
• Server & Application Fingerprinting
• Identifying the entry points
• Page enumeration and brute forcing
• Looking for leftovers and backup files

Authentication vulnerabilities
• Authentication scenarios
• User enumeration
• Guessing passwords - Brute force & Dictionary attacks
• Default users/passwords
• Weak password policy
• Direct page requests
• Parameter modification
• Password flaws
• Locking out users
• Lack of SSL at login pages
• Bypassing weak CAPTCHA mechanisms
• Login without SSL

Authorization vulnerabilities
• Role-based access control (RBAC)
• Authorization bypassing
• Forceful browsing
• Client-side validation attacks
• Insecure direct object reference

www.infosectrain.com | [email protected] 05
Improper Input Validation & Injection vulnerabilities

• Input validation techniques


• Blacklist VS. Whitelist input validation bypassing
• Encoding attacks
• OWASP Top 10 Vulnerabilities
• Directory traversal
• Threat Modelling Principle
• Command injection
• Site Mapping & Web Crawling
• Code injection
• Server & Application Fingerprinting
• Log injection
• Identifying the entry points
• XML injection – XPath Injection | Malicious files | XML Entity
• Page enumeration and brute forcing
• bomb
• Looking for leftovers and backup files
• LDAP Injection
• SQL injection
• Common implementation mistakes – authentication
• Bypassing using SQL Injection
• Cross Site Scripting (XSS)
• Reflected VS. Stored XSS
• Special chars – ‘ & < >, empty

Insecure file handling


• Path traversal • Directory listing
• Canonicalization • File size
• Uploaded files backdoors • File type
• Insecure file extension handling • Malware upload

Session & browser manipulation attacks


• Session management techniques • Session id rotation
• Cookie based session management • Session Fixation
• Cookie properties • Cross Site Request Forgery (CSRF)
• Cookies - secrets in cookies, tampering - URL Encoding
• Exposed session variables • Open redirect
• Missing Attributes - httpOnly, secure
• Session validity after logoff
• Long session timeout
• Session keep alive - enable/disable

www.infosectrain.com | [email protected] 06
Information leak

• Web Services Assessment


• Web Service Testing
• OWASP Web Service Specific Testing
• OWASP Top 10 Vulnerabilities
• Testing WSDL
• Threat Modelling Principle
• Sql Injection to Root
• Site Mapping & Web Crawling
• LFI and RFI]
• Server & Application Fingerprinting
• OWASP Top 10 Revamp
• Identifying the entry points
• Page enumeration and brute forcing
• Looking for leftovers and backup files

www.infosectrain.com | [email protected] 07
www.infosectrain.com | [email protected]

You might also like